Movatterモバイル変換


[0]ホーム

URL:


US20160164751A1 - Brokering data access requests and responses - Google Patents

Brokering data access requests and responses
Download PDF

Info

Publication number
US20160164751A1
US20160164751A1US15/040,194US201615040194AUS2016164751A1US 20160164751 A1US20160164751 A1US 20160164751A1US 201615040194 AUS201615040194 AUS 201615040194AUS 2016164751 A1US2016164751 A1US 2016164751A1
Authority
US
United States
Prior art keywords
brokering
entity
response
data access
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/040,194
Other versions
US9654352B2 (en
Inventor
Zhen Liu
Bobby Chiu Chun Mak
Jerry Huang
Jun He
Xiaomin DENG
QingHu Li
Wei Pu Zhang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp, Microsoft Technology Licensing LLCfiledCriticalMicrosoft Corp
Priority to US15/040,194priorityCriticalpatent/US9654352B2/en
Publication of US20160164751A1publicationCriticalpatent/US20160164751A1/en
Application grantedgrantedCritical
Publication of US9654352B2publicationCriticalpatent/US9654352B2/en
Assigned to MICROSOFT CORPORATIONreassignmentMICROSOFT CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: DENG, Xiaomin, HE, JUN, MAK, BOBBY CHIU CHUN, LI, QINGHU, HUANG, JERRY, LIU, ZHEN, ZHANG, WEI PU
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLCreassignmentMICROSOFT TECHNOLOGY LICENSING, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MICROSOFT CORPORATION
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present invention extends to methods, systems, and computer program products for brokering data access requests and responses. Aspects of the invention include a brokering pipeline that sequentially processes data access requests and data access responses. The brokering pipeline manages access authentications, request brokering, response rewrite, cache, and hosting multiple (e.g., business) entities.

Description

Claims (20)

What is claimed:
1. A computer system, the computer system comprising:
one or more processors;
system memory;
a brokering service, using the one or more processors, configured to:
receive a data access request from an entity outside a security boundary, the data access request requesting data maintained inside the security boundary;
access a response for the data access request from an exposed endpoint, the exposed endpoint for an internal identity used inside the security boundary, the entity having been mapped to the internal identity;
decouple the exposed endpoint from the entity by rewriting the response to make it appear that a component of a brokering pipeline generated the response; and
send the re-written response to the entity.
2. The system ofclaim 1, further comprising the brokering service, using the one or more processors, configured to map the entity to the internal identity
3. The system ofclaim 2, wherein the brokering service, using the one or more processors, configured to map the entity to the internal identity comprises the brokering service, using the one or more processors, configured to refer to an access directory to determine that the entity maps to the internal identity.
4. The system ofclaim 1, further comprising the brokering service, using the one or more processors, configured to validate the entity for public access to the brokering pipeline.
5. The system ofclaim 1, further comprising the brokering service, using the one or more processors, configured to send the data access request to the exposed endpoint.
6. The system ofclaim 1, further comprising the brokering service, using the one or more processors, configured to:
register logic associated with the entity at a query engine; and
sending the data access request to the registered logic.
7. The system ofclaim 1, wherein the brokering service, using the one or more processors, configured to receive a data access request from an entity outside a security boundary comprises the brokering service, using the one or more processors, configured to receive a data access request from a computing domain; and
further comprising the brokering service, using the one or more processors, configured to validate the computing domain for private access to one or more data repositories.
8. The method ofclaim 1, wherein the brokering service, using the one or more processors, configured to access a response for the data access request comprises the brokering service, using the one or more processors, configured to access the response from a caching layer of the brokering pipeline.
9. The method ofclaim 1, wherein the brokering service, using the one or more processors, configured to access a response for the data access request comprises the brokering service, using the one or more processors, configured to access a response that includes the requested data returned from one or more data repositories.
10. A method for use at a computer system, the computer system including a processor, a method for brokering a data access request, the method comprising the processor:
receiving a data access request from an entity outside a security boundary, the data access request requesting data maintained inside the security boundary;
accessing a response for the data access request from an exposed endpoint, the exposed endpoint for an internal identity used inside the security boundary, the entity having been mapped to the internal identity;
decoupling the exposed endpoint from the entity by rewriting the response to make it appear that a component of a brokering pipeline inside the security boundary generated the response; and
sending the re-written response to the entity.
11. The method ofclaim 10, further comprising mapping the entity to the internal identity.
12. The method ofclaim 11, wherein mapping the entity to the internal identity comprises referring to an access directory to determine that the entity maps to the internal identity.
13. The method ofclaim 10, further comprising validating the entity for public access to the brokering pipeline.
14. The method ofclaim 10, further comprising registering logic associated with the entity at a query engine.
15. The method ofclaim 10, wherein receiving a data access request from an entity outside a security boundary comprises receiving a data access request from a computing domain; and
further comprising validating the computing domain for private access to the one or more data repositories.
16. The method ofclaim 10, further comprising sending the data access request to the exposed endpoint.
17. The method ofclaim 16, wherein sending the data access request to the exposed endpoint comprises sending the data access request to registered logic at a query engine.
18. The method ofclaim 1, wherein accessing a response for the data access request comprises accessing a response that includes the requested data returned from a caching layer of the brokering pipeline.
19. The method ofclaim 1, wherein accessing a response to for data access request comprises accessing a response that includes the requested data returned from one or more data repositories.
20. A computer program product for use at a computer system, the computer program product for implementing a method for brokering a data access request, the computer program product comprising one or more computer storage devices having stored thereon computer-executable instructions that, when executed at a processor, cause the computer system to perform the method, including the following:
receive a data access request from an entity outside a security boundary, the data access request requesting data maintained inside the security boundary;
access a response for the data access request from an exposed endpoint, the exposed endpoint for an internal identity used inside the security boundary, the entity having been mapped to the internal identity;
decouple the exposed endpoint from the entity by rewriting the response to make it appear that a component of a brokering pipeline inside the security boundary generated the response; and
send the re-written response to the entity.
US15/040,1942014-07-152016-02-10Brokering data access requests and responsesActiveUS9654352B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/040,194US9654352B2 (en)2014-07-152016-02-10Brokering data access requests and responses

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
PCT/CN2014/082214WO2016008089A1 (en)2014-07-152014-07-15Brokering data access requests and responses
CNPCT/CN2014/0822142014-07-15
WOPCT/CN2014/0822142014-07-15
US14/557,342US9305178B2 (en)2014-07-152014-12-01Brokering data access requests and responses
US15/040,194US9654352B2 (en)2014-07-152016-02-10Brokering data access requests and responses

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/557,342ContinuationUS9305178B2 (en)2014-07-152014-12-01Brokering data access requests and responses

Publications (2)

Publication NumberPublication Date
US20160164751A1true US20160164751A1 (en)2016-06-09
US9654352B2 US9654352B2 (en)2017-05-16

Family

ID=55074811

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/557,342ActiveUS9305178B2 (en)2014-07-152014-12-01Brokering data access requests and responses
US15/040,194ActiveUS9654352B2 (en)2014-07-152016-02-10Brokering data access requests and responses

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/557,342ActiveUS9305178B2 (en)2014-07-152014-12-01Brokering data access requests and responses

Country Status (5)

CountryLink
US (2)US9305178B2 (en)
EP (1)EP3170089B1 (en)
CN (1)CN105518636B (en)
BR (1)BR112017000727B1 (en)
WO (1)WO2016008089A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12052251B1 (en)*2018-02-082024-07-30Wells Fargo Bank, N.A.Compliance management system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2018055479A (en)*2016-09-292018-04-05富士通株式会社 Service condition processing program, apparatus, and method
CN112447279A (en)*2020-12-102021-03-05上海联影医疗科技股份有限公司Task processing method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6192405B1 (en)*1998-01-232001-02-20Novell, Inc.Method and apparatus for acquiring authorized access to resources in a distributed system
US7035899B2 (en)*2003-07-182006-04-25Remote Meeting Technologies, Inc.Method and system for remote conferencing via launching a web-based presentation sharing application based on code associated with the presentation sharing control
US20090276667A1 (en)*2008-05-022009-11-05Microsoft CorporationSession Broker Extensibility Application Program Interface
US20100325199A1 (en)*2009-06-222010-12-23Samsung Electronics Co., Ltd.Client, brokerage server and method for providing cloud storage
US20130067531A1 (en)*2011-09-122013-03-14Microsoft CorporationAccess Brokering Based on Declarations and Consent
US20130066940A1 (en)*2010-05-202013-03-14Weixiang ShaoCloud service broker, cloud computing method and cloud system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6859783B2 (en)*1995-12-292005-02-22Worldcom, Inc.Integrated interface for web based customer care and trouble management
US6049821A (en)*1997-01-242000-04-11Motorola, Inc.Proxy host computer and method for accessing and retrieving information between a browser and a proxy
US20070038596A1 (en)*2005-08-152007-02-15Microsoft CorporationRestricting access to data based on data source rewriting
CN101276432B (en)*2008-05-202011-07-20普天信息技术研究院有限公司Memory card and method for realizing digital content protection
CN101478546B (en)*2009-01-232011-11-16成都市华为赛门铁克科技有限公司Method for protecting network safety and network safety protecting equipment
US9183683B2 (en)*2010-09-282015-11-10Sony Computer Entertainment Inc.Method and system for access to secure resources
US8813206B2 (en)*2012-11-272014-08-19Hong Kong Applied Science and Technology Research Institute Company LimitedAnonymous personal content access with content bridge

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6192405B1 (en)*1998-01-232001-02-20Novell, Inc.Method and apparatus for acquiring authorized access to resources in a distributed system
US7035899B2 (en)*2003-07-182006-04-25Remote Meeting Technologies, Inc.Method and system for remote conferencing via launching a web-based presentation sharing application based on code associated with the presentation sharing control
US20090276667A1 (en)*2008-05-022009-11-05Microsoft CorporationSession Broker Extensibility Application Program Interface
US20100325199A1 (en)*2009-06-222010-12-23Samsung Electronics Co., Ltd.Client, brokerage server and method for providing cloud storage
US20130066940A1 (en)*2010-05-202013-03-14Weixiang ShaoCloud service broker, cloud computing method and cloud system
US20130067531A1 (en)*2011-09-122013-03-14Microsoft CorporationAccess Brokering Based on Declarations and Consent

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12052251B1 (en)*2018-02-082024-07-30Wells Fargo Bank, N.A.Compliance management system

Also Published As

Publication numberPublication date
WO2016008089A1 (en)2016-01-21
BR112017000727A2 (en)2017-11-14
CN105518636B (en)2018-11-23
US9305178B2 (en)2016-04-05
EP3170089A1 (en)2017-05-24
EP3170089A4 (en)2017-12-13
EP3170089B1 (en)2018-08-22
CN105518636A (en)2016-04-20
BR112017000727B1 (en)2022-12-20
US20160019399A1 (en)2016-01-21
US9654352B2 (en)2017-05-16

Similar Documents

PublicationPublication DateTitle
US10838916B2 (en)Access control for unprotected data storage system endpoints
US8468352B2 (en)Retrieving and using cloud based storage credentials
CN106716404B (en) Proxy server within the computer subnet
US11483350B2 (en)Intent-based governance service
US20190289031A1 (en)Blockchain web browser interface
JP6314236B2 (en) Entity handle registry to support traffic policy enforcement
US11290472B2 (en)Threat intelligence information access via a DNS protocol
US8694653B2 (en)Targeted data transfer between operational domains
US8533773B2 (en)Methods and systems for implementing service level consolidated user information management
CN103067344B (en)The noninvasive method of automatic distributing safety regulation and equipment in cloud environment
Vogel et al.Experiences on migrating RESTful web services to GraphQL
EP3170091B1 (en)Method and server of remote information query
US9178698B1 (en)Dynamic key management
US10282461B2 (en)Structure-based entity analysis
US12069145B2 (en)Dynamic domain discovery and proxy configuration
US8949933B2 (en)Centralized management of technical records across an enterprise
US8396969B1 (en)Domain name buckets in a hosted storage system
US9654352B2 (en)Brokering data access requests and responses
WO2019070343A1 (en)Identifying and consenting to permissions for workflow and code execution
US11663058B1 (en)Preemptive filtering of events of an event bus with a deterministic filter
US11297065B2 (en)Technology for computing resource liaison
US11838328B1 (en)Preventing data exfiltration to unsanctioned cloud computing services (CCS) accounts using CCS application programming interfaces
US9906619B2 (en)Method, system, and computer program product to update content on networked cache servers
CN117118642A (en)Access request processing method, device, equipment and storage medium
CN105103159A (en)Spooling system call data to facilitate data transformation

Legal Events

DateCodeTitleDescription
STCFInformation on status: patent grant

Free format text:PATENTED CASE

ASAssignment

Owner name:MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:045870/0957

Effective date:20141014

Owner name:MICROSOFT CORPORATION, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIU, ZHEN;MAK, BOBBY CHIU CHUN;HUANG, JERRY;AND OTHERS;SIGNING DATES FROM 20141105 TO 20141113;REEL/FRAME:045870/0925

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp